5.4 C
New York
Wednesday, April 2, 2025

Large SMS stealer marketing campaign infects Android gadgets in 113 international locations


Large SMS stealer marketing campaign infects Android gadgets in 113 international locations

A malicious marketing campaign focusing on Android gadgets worldwide makes use of 1000’s of Telegram bots to contaminate gadgets with SMS-stealing malware and steal one-time 2FA passwords (OTPs) for over 600 providers.

Zimperium researchers found the operation and have been monitoring it since February 2022. They report discovering not less than 107,000 distinct malware samples related to the marketing campaign.

The cybercriminals are motivated by monetary achieve, almost definitely utilizing contaminated gadgets as authentication and anonymization relays.

Telegram entrapment

The SMS stealer is distributed both via malvertising or Telegram bots that automate communications with the sufferer.

Within the first case, victims are led to pages mimicking Google Play, reporting inflated obtain counts so as to add legitimacy and create a false sense of belief.

On Telegram, the bots promise to present the consumer a pirated utility for the Android platform, asking for his or her cellphone quantity earlier than they share the APK file.

The Telegram bot makes use of that quantity to generate a brand new APK, making personalised monitoring or future assaults attainable.

Telegram bot delivering the SMS stealer
Telegram bot delivering the SMS stealer to a sufferer
Supply: Zimperium

Zimperium says the operation makes use of 2,600 Telegram bots to advertise numerous Android APKs, that are managed by 13 command and management (C2) servers.

A lot of the victims of this marketing campaign are situated in India and Russia, whereas Brazil, Mexico, and the USA even have important sufferer counts.

Producing cash

Zimperium discovered that the malware transmits the captured SMS messages to a particular API endpoint on the web site ‘fastsms.su.’

The positioning permits guests to buy entry to “digital” cellphone numbers in international international locations, which they’ll use for anonymization and to authenticate to on-line platforms and providers.

Fast SMS website
Quick SMS web site
Supply: BleepingComputer

It is vitally seemingly that the contaminated gadgets are actively utilized by that service with out the victims realizing it.

The requested Android SMS entry permissions permit the malware to seize the OTPs required for account registrations and two-factor authentication.

The stealer malware exfiltrating SMS to the site's API
The malware exfiltrating SMS to the Quick SMS website
Supply: Zimperium

BleepingComputer has contacted the Quick SMS service to ask about Zimperium’s findings, however a response wasn’t out there by publication.

For the victims, this could incur unauthorized costs on their cell account, whereas they could even be implicated in unlawful actions traced again to their gadget and quantity.

To keep away from cellphone quantity abuse, keep away from downloading APK information from exterior Google Play, don’t grant dangerous permissions to apps with unrelated performance, and guarantee Play Defend is energetic in your gadget.


Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles